Mottaqiallah Taouil
205 records found
1
Authored
In-Depth Analysis of DRAM Cells During Rowhammer
And a Novel Protection Method
FPGA-based soft error correction for the memory of microcontrollers
A generic methodology to transparent soft error correction for the off-chip memory of microcontrollers operating in space
Detecting Unique RRAM Faults
High Fault Coverage Design-For-Testability Scheme
Hardware-Based Methods for Memory Acquisition
Analysis and Improvements
Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...
Embedded Memory Security
Preventing hardware based attacks on the memory of IoT devices
Circumventing Secure JTAG
A detailed plan of attack
Contributed
In-Depth Analysis of DRAM Cells During Rowhammer
And a Novel Protection Method
In-Depth Analysis of DRAM Cells During Rowhammer
And a Novel Protection Method
FPGA-based soft error correction for the memory of microcontrollers
A generic methodology to transparent soft error correction for the off-chip memory of microcontrollers operating in space
FPGA-based soft error correction for the memory of microcontrollers
A generic methodology to transparent soft error correction for the off-chip memory of microcontrollers operating in space
Detecting Unique RRAM Faults
High Fault Coverage Design-For-Testability Scheme
Detecting Unique RRAM Faults
High Fault Coverage Design-For-Testability Scheme
Hardware-Based Methods for Memory Acquisition
Analysis and Improvements
Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...
Hardware-Based Methods for Memory Acquisition
Analysis and Improvements
Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...
Hardware-Based Methods for Memory Acquisition
Analysis and Improvements
Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...